{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T09:03:47Z","timestamp":1726304627224},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T00:00:00Z","timestamp":1686268800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T00:00:00Z","timestamp":1686268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1703261"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering","award":["2017SDSJ06"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. & Cyber."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s13042-023-01877-8","type":"journal-article","created":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T04:01:47Z","timestamp":1686283307000},"page":"3993-4008","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A writing style-based multi-task model with the hierarchical attention for rumor detection"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0131-2482","authenticated-orcid":false,"given":"Shuzhen","family":"Wan","sequence":"first","affiliation":[]},{"given":"Bin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Fangmin","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Mengyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guanghao","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,9]]},"reference":[{"issue":"5","key":"1877_CR1","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1108\/IntR-05-2012-0095","volume":"23","author":"C Castillo","year":"2013","unstructured":"Castillo C, Mendoza M, Poblete B (2013) Predicting information credibility in time-sensitive social media. Internet Res 23(5):560\u2013588. https:\/\/doi.org\/10.1108\/IntR-05-2012-0095","journal-title":"Internet Res"},{"issue":"3","key":"1877_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3003433","volume":"17","author":"SM Mohammad","year":"2017","unstructured":"Mohammad SM, Sobhani P, Kiritchenko S (2017) Stance and sentiment in tweets. ACM Trans Internet Technol (TOIT) 17(3):1\u201323. https:\/\/doi.org\/10.1145\/3003433","journal-title":"ACM Trans Internet Technol (TOIT)"},{"issue":"2","key":"1877_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCSS.2016.2612980","volume":"3","author":"Y Liu","year":"2016","unstructured":"Liu Y, Xu S (2016) Detecting rumors through modeling information propagation networks in a social media environment. IEEE Trans Comput Soc Syst 3(2):46\u201362. https:\/\/doi.org\/10.1109\/TCSS.2016.2612980","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1877_CR4","first-page":"575","volume":"2018","author":"S Volkova","year":"2018","unstructured":"Volkova S, Jang JY (2018) Misleading or falsification: inferring deceptive strategies and types in online news and social media. Proc Web Conf 2018:575\u2013583","journal-title":"Proc Web Conf"},{"key":"1877_CR5","unstructured":"Ma J, Gao W, Mitra P, Kwon S, Jansen BJ, Wong K-F, Cha M (2016) Detecting rumors from microblogs with recurrent neural networks. In: Proceedings of the 25th international joint conference on artificial intelligence, IJCAI 2016, pp 3818\u20133824"},{"key":"1877_CR6","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.cose.2019.02.003","volume":"83","author":"F Yu","year":"2019","unstructured":"Yu F, Liu Q, Wu S, Wang L, Tan T (2019) Attention-based convolutional approach for misinformation identification from massive and noisy microblog posts. Comput Security 83:106\u2013121. https:\/\/doi.org\/10.1016\/j.cose.2019.02.003","journal-title":"Comput Security"},{"key":"1877_CR7","doi-asserted-by":"crossref","unstructured":"Jin Z, Cao J, Guo H, Zhang Y, Luo J (2017) Multimodal fusion with recurrent neural networks for rumor detection on microblogs. In: Proceedings of the 25th ACM international conference on multimedia, pp 795\u2013816","DOI":"10.1145\/3123266.3123454"},{"key":"1877_CR8","doi-asserted-by":"crossref","unstructured":"Bian T, Xiao X, Xu T, Zhao P, Huang W, Rong Y, Huang J (2020) Rumor detection on social media with bi-directional graph convolutional networks. In: Proceedings of the AAAI conference on artificial intelligence, pp 549\u2013556","DOI":"10.1609\/aaai.v34i01.5393"},{"issue":"1","key":"1877_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1023\/A:1007379606734","volume":"28","author":"R Caruana","year":"1997","unstructured":"Caruana R (1997) Multitask learning. Mach Learn 28(1):41\u201375. https:\/\/doi.org\/10.1023\/A:1007379606734","journal-title":"Mach Learn"},{"key":"1877_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3070203","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Yang Q (2017) A survey on multi-task learning. IEEE Trans Knowl Data Eng. https:\/\/doi.org\/10.1109\/TKDE.2021.3070203","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1877_CR11","first-page":"585","volume":"2018","author":"J Ma","year":"2018","unstructured":"Ma J, Gao W, Wong K-F (2018) Detect rumor and stance jointly by neural multi-task learning. Proc Web Conf 2018:585\u2013593","journal-title":"Proc Web Conf"},{"key":"1877_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3065498","author":"H Zhang","year":"2021","unstructured":"Zhang H, Qian S, Fang Q, Xu C (2021) Multi-modal meta multi-task learning for social media rumor detection. IEEE Trans Multimedia. https:\/\/doi.org\/10.1109\/TMM.2021.3065498","journal-title":"IEEE Trans Multimedia"},{"key":"1877_CR13","doi-asserted-by":"crossref","unstructured":"Przybyla P (2020) Capturing the style of fake news. In: Proceedings of the AAAI conference on artificial intelligence, pp 490\u2013497","DOI":"10.1609\/aaai.v34i01.5386"},{"issue":"5","key":"1877_CR14","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1002\/asi.23216","volume":"66","author":"VL Rubin","year":"2015","unstructured":"Rubin VL, Lukoianova T (2015) Truth and deception at the rhetorical structure level. J Am Soc Inf Sci 66(5):905\u2013917. https:\/\/doi.org\/10.1002\/asi.23216","journal-title":"J Am Soc Inf Sci"},{"key":"1877_CR15","doi-asserted-by":"crossref","unstructured":"Yang Z, Yang D, Dyer C, He X, Smola A, Hovy E (2016) Hierarchical attention networks for document classification. In: Proceedings of the 2016 conference of the North American chapter of the association for computational linguistics: human language technologies, pp 1480\u20131489","DOI":"10.18653\/v1\/N16-1174"},{"key":"1877_CR16","doi-asserted-by":"crossref","unstructured":"Rashkin H, Choi E, Jang JY, Volkova S, Choi Y (2017) Truth of varying shades: analyzing language in fake news and political fact-checking. In: Proceedings of the 2017 conference on empirical methods in natural language processing, pp 2931\u20132937","DOI":"10.18653\/v1\/D17-1317"},{"key":"1877_CR17","unstructured":"Hanselowski A, Avinesh PVS, Schiller B, Caspelherr F, Chaudhuri D, Meyer CM, Gurevych I (2018) A retrospective analysis of the fake news challenge stance detection task. In: Proceedings of the 27th international conference on computational linguistics, pp 1859\u20131874"},{"key":"1877_CR18","doi-asserted-by":"crossref","unstructured":"Ma J, Gao W, Wong K-F (2017) Detect rumors in microblog posts using propagation structure via kernel learning. In: Proceedings of the annual meeting of the association for computational linguistics and the conference of the European chapter of the association for computational linguistics, pp 708\u2013717","DOI":"10.18653\/v1\/P17-1066"},{"issue":"1","key":"1877_CR19","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/mmul.2022.3146568","volume":"29","author":"J Chen","year":"2022","unstructured":"Chen J, Wu Z, Yang Z, Xie H, Wang FL, Liu W (2022) Multimodal fusion network with contrary latent topic memory for rumor detection. IEEE Multimedia 29(1):104\u2013113. https:\/\/doi.org\/10.1109\/mmul.2022.3146568","journal-title":"IEEE Multimedia"},{"issue":"5","key":"1877_CR20","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1007\/s00607-021-01034-5","volume":"104","author":"N Bai","year":"2022","unstructured":"Bai N, Meng F, Rui X, Wang Z (2022) Rumor detection based on a source-replies conversation tree convolutional neural net. Computing 104(5):1155\u20131171. https:\/\/doi.org\/10.1007\/s00607-021-01034-5","journal-title":"Computing"},{"key":"1877_CR21","unstructured":"Sun Y, Chen Y, Wang X, Tang X (2014) Deep learning face representation by joint identification-verification. In: NIPS, pp 1988\u20131996"},{"key":"1877_CR22","unstructured":"Kochkina E, Liakata M, Zubiaga A (2018) All-in-one: Multi-task learning for rumour verification. In: Proceedings of the 27th international conference on computational linguistics, pp 3402\u20133413"},{"key":"1877_CR23","doi-asserted-by":"crossref","unstructured":"Wu L, Rao Y, Jin H, Nazir A, Sun L (2019) Different absorption from the same sharing: Sifted multi-task learning for fake news detection. In: Proceedings of the 2019 conference on empirical methods in natural language processing and the 9th international joint conference on natural language processing (EMNLP-IJCNLP), pp 4644\u20134653","DOI":"10.18653\/v1\/D19-1471"},{"key":"1877_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03833-5","author":"N Bai","year":"2022","unstructured":"Bai N, Meng F, Ru X, Wang Z (2022) A multi-task attention tree neural net for stance classification and rumor veracity detection. Appl Intell. https:\/\/doi.org\/10.1007\/s10489-022-03833-5","journal-title":"Appl Intell"},{"issue":"2","key":"1877_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3377478","volume":"1","author":"X Zhou","year":"2020","unstructured":"Zhou X, Jain A, Phoha VV, Zafarani R (2020) Fake news early detection: a theory-driven model. Digit Threats Res Practice 1(2):1\u201325. https:\/\/doi.org\/10.1145\/3377478","journal-title":"Digit Threats Res Practice"},{"key":"1877_CR26","doi-asserted-by":"crossref","unstructured":"Potthast M, Kiesel J, Reinartz K, Bevendorff J, Stein B (2018) A stylometric inquiry into hyperpartisan and fake news. In: Proceedings of the 56th annual meeting of the association for computational linguistics, vol 1. Long Papers, pp 231\u2013240","DOI":"10.18653\/v1\/P18-1022"},{"key":"1877_CR27","unstructured":"Xu K, Ba J, Kiros R, Cho K, Courville A, Salakhudinov R, Zemel R, Bengio Y (2015) Show, attend and tell: neural image caption generation with visual attention. In: Proceedings of the international conference on machine learning, pp 2048\u20132057"},{"key":"1877_CR28","doi-asserted-by":"crossref","unstructured":"Luong M-T, Pha, H, Manning CD (2015) Effective approaches to attention-based neural machine translation. In: Proceedings of the 2015 conference on empirical methods in natural language processing, pp 1412\u20131421","DOI":"10.18653\/v1\/D15-1166"},{"key":"1877_CR29","doi-asserted-by":"publisher","unstructured":"Raffel C, Ellis DP (2015) Feed-forward networks with attention can solve some long-term memory problems. arXiv preprint arXiv:1512.08756, pp 1\u20136. https:\/\/doi.org\/10.48550\/arXiv.1512.08756","DOI":"10.48550\/arXiv.1512.08756"},{"key":"1877_CR30","doi-asserted-by":"crossref","unstructured":"Guo H, Cao J, Zhang Y, Guo J, Li J (2018) Rumor detection with hierarchical social attention network. In: Proceedings of the 27th ACM international conference on information and knowledge management, pp 943\u2013951","DOI":"10.1145\/3269206.3271709"},{"key":"1877_CR31","doi-asserted-by":"crossref","unstructured":"Lin X, Liao X, Xu T, Pian W, Wong K-F (2019) Rumor detection with hierarchical recurrent convolutional neural network. In: Proceedings of the CCF international conference on natural language processing and Chinese computing, pp 338\u2013348","DOI":"10.1007\/978-3-030-32236-6_30"},{"key":"1877_CR32","doi-asserted-by":"crossref","unstructured":"Castillo C, Mendoza M, Poblete, B (2011) Information credibility on twitter. In: Proceedings of the 20th international conference on world wide web, pp 675\u2013684","DOI":"10.1145\/1963405.1963500"},{"key":"1877_CR33","unstructured":"Qazvinian V, Rosengren E, Radev D, Mei Q (2011) Rumor has it: identifying misinformation in microblogs. In: Proceedings of the 2011 conference on empirical methods in natural language processing, pp 1589\u20131599"},{"key":"1877_CR34","doi-asserted-by":"publisher","first-page":"51522","DOI":"10.1109\/ACCESS.2019.2909919","volume":"7","author":"G Xu","year":"2019","unstructured":"Xu G, Meng Y, Qiu X, Yu Z, Wu X (2019) Sentiment analysis of comment texts based on bilstm. IEEE Acces 7:51522\u201351532. https:\/\/doi.org\/10.1109\/ACCESS.2019.2909919","journal-title":"IEEE Acces"},{"issue":"8","key":"1877_CR35","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput"},{"key":"1877_CR36","unstructured":"Zubiaga A, Liakata M, Procter R (2016) Learning reporting dynamics during breaking news for rumour detection in social media. arXiv preprint arXiv:1610.07363, pp 1\u201320"},{"key":"1877_CR37","doi-asserted-by":"crossref","unstructured":"Zhao Z, Resnick P, Mei Q (2015) Enquiring minds: early detection of rumors in social media from enquiry posts. In: Proceedings of the 24th international conference on world wide web, pp 1395\u20131405","DOI":"10.1145\/2736277.2741637"},{"key":"1877_CR38","doi-asserted-by":"crossref","unstructured":"Ma J, Gao W, Wei Z, Lu Y, Wong K-F (2015) Detect rumors using time series of social context information on microblogging websites. In: Proceedings of the 24th ACM international on conference on information and knowledge management, pp 1751\u20131754","DOI":"10.1145\/2806416.2806607"},{"key":"1877_CR39","unstructured":"Chen Y (2015) Convolutional neural network for sentence classification. PhD thesis, University of Waterloo"},{"key":"1877_CR40","doi-asserted-by":"crossref","unstructured":"Yu F, Liu Q, Wu S, Wang L, Tan T, et al (2017) A convolutional approach for misinformation identification. In: Proceedings of the international joint conference on artificial intelligence, pp 3901\u20133907","DOI":"10.24963\/ijcai.2017\/545"},{"key":"1877_CR41","doi-asserted-by":"crossref","unstructured":"Wang Y, Ma F, Jin Z, Yuan Y, Xun G, Jha K, Su L, Gao J (2018) Eann: event adversarial neural networks for multi-modal fake news detection. In: Proceedings of the 24th Acm sigkdd international conference on knowledge discovery & data mining, pp 849\u2013857","DOI":"10.1145\/3219819.3219903"},{"key":"1877_CR42","doi-asserted-by":"crossref","unstructured":"Singhal S, Kabra A, Sharma M, Shah RR, Chakraborty T, Kumaraguru P (2020) Spotfake+: A multimodal framework for fake news detection via transfer learning (student abstract). In: Proceedings of the AAAI conference on artificial intelligence, pp 13915\u201313916","DOI":"10.1609\/aaai.v34i10.7230"},{"key":"1877_CR43","doi-asserted-by":"crossref","unstructured":"Ma J, Gao W, Wong K-F (2018) Rumor detection on twitter with tree-structured recursive neural networks. In: Proceedings of the 56th conference of the association for computational linguistics, pp 1980\u20131989","DOI":"10.18653\/v1\/P18-1184"},{"key":"1877_CR44","doi-asserted-by":"crossref","unstructured":"Sun M, Zhang X, Zheng J, Ma G (2022) Ddgcn: dual dynamic graph convolutional networks for rumor detection on social media. In: Proceedings of the AAAI conference on artificial intelligence, pp 4611\u20134619","DOI":"10.1609\/aaai.v36i4.20385"}],"updated-by":[{"updated":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T00:00:00Z","timestamp":1690416000000},"DOI":"10.1007\/s13042-023-01915-5","type":"correction","label":"Correction"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-023-01877-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-023-01877-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-023-01877-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T04:13:19Z","timestamp":1695787999000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-023-01877-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,9]]},"references-count":44,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["1877"],"URL":"https:\/\/doi.org\/10.1007\/s13042-023-01877-8","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,9]]},"assertion":[{"value":"8 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2023","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s13042-023-01915-5","URL":"https:\/\/doi.org\/10.1007\/s13042-023-01915-5","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}